{"id":605,"date":"2026-02-05T14:36:03","date_gmt":"2026-02-05T14:36:03","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=605"},"modified":"2026-02-05T14:36:04","modified_gmt":"2026-02-05T14:36:04","slug":"traverxec-hackthebox","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=605","title":{"rendered":"Traverxec- Hackthebox"},"content":{"rendered":"\n<p>I began with an <strong>Nmap scan<\/strong> to identify open TCP ports, detect service versions, and run the default NSE scripts. The scan revealed <strong>two open ports: 22 (SSH) and 80 (HTTP)<\/strong>. Port 80 was hosting a web server identified as <strong>Nostromo version 1.9.6<\/strong>. This immediately caught my attention, as Nostromo is not commonly seen in modern environments. I proceeded to research known vulnerabilities associated with this specific version to determine if it could be leveraged for initial access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"471\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-18-1024x471.png\" alt=\"\" class=\"wp-image-607\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-18-1024x471.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-18-300x138.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-18-768x353.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-18-1536x706.png 1536w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-18.png 1714w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>execution (RCE)<\/strong> flaw. I reviewed the corresponding <strong>Exploit Database<\/strong> entry to better understand how the vulnerability worked and to verify that it applied to this specific version of the service. After confirming its relevance, I downloaded the exploit and prepared to test it against the target.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"810\" height=\"445\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-19.png\" alt=\"\" class=\"wp-image-608\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-19.png 810w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-19-300x165.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-19-768x422.png 768w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/figure>\n\n\n\n<p>After running the exploit against the target, I was able to execute the <code>id<\/code> command successfully. The output confirmed that the exploit was working and that remote command execution was possible on the system. This verified that the vulnerability could be leveraged to run arbitrary commands, providing an initial foothold on the target machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"980\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-20-1024x980.png\" alt=\"\" class=\"wp-image-609\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-20-1024x980.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-20-300x287.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-20-768x735.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-20.png 1122w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Next, I leveraged the command execution vulnerability to invoke <strong>Netcat<\/strong> and establish a reverse shell back to my attacker machine over port <strong>443<\/strong>. I set up a listener on my local system and executed the payload through the exploit. Shortly after, the connection was received successfully, granting me an interactive shell on the target and confirming remote access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"552\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-21-1024x552.png\" alt=\"\" class=\"wp-image-610\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-21-1024x552.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-21-300x162.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-21-768x414.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-21.png 1306w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Shell as www-data user<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"498\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-22-1024x498.png\" alt=\"\" class=\"wp-image-611\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-22-1024x498.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-22-300x146.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-22-768x374.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-22.png 1126w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>While enumerating the local filesystem, I searched for sensitive files such as configuration files, credential stores, and user-related data. During this process, I discovered a password hash belonging to the user <strong>david<\/strong>. This suggested the possibility of credential reuse or offline hash cracking, which could potentially allow lateral movement or privilege escalation on the system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1018\" height=\"176\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-23.png\" alt=\"\" class=\"wp-image-612\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-23.png 1018w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-23-300x52.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-23-768x133.png 768w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\" \/><\/figure>\n\n\n\n<p>I extracted the discovered hash and used <strong>John<\/strong> to attempt offline password cracking. After running the tool against the hash, the password was successfully recovered. With valid credentials for the <strong>david<\/strong> user now available, I tried to switch users but the discovered credential was not working.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"878\" height=\"213\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-24.png\" alt=\"\" class=\"wp-image-613\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-24.png 878w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-24-300x73.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-24-768x186.png 768w\" sizes=\"auto, (max-width: 878px) 100vw, 878px\" \/><\/figure>\n\n\n\n<p>Continuing my enumeration of the filesystem, I discovered an archive named <strong><code>backup-ssh-identity-files.tgz<\/code><\/strong>. The filename immediately stood out, as it suggested the archive might contain SSH keys or other authentication material. Access to such files could potentially allow lateral movement or direct login as another user, so I proceeded to extract and inspect its contents.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"704\" height=\"204\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-25.png\" alt=\"\" class=\"wp-image-614\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-25.png 704w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-25-300x87.png 300w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/figure>\n\n\n\n<p>To analyze the archive, I used <strong>Netcat<\/strong> to transfer the file from the target machine to my attacker system. Once the file was successfully copied over, I extracted it locally to inspect its contents.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"42\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-26-1024x42.png\" alt=\"\" class=\"wp-image-615\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-26-1024x42.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-26-300x12.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-26-768x32.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-26.png 1279w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"79\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-27.png\" alt=\"\" class=\"wp-image-616\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-27.png 505w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-27-300x47.png 300w\" sizes=\"auto, (max-width: 505px) 100vw, 505px\" \/><\/figure>\n\n\n\n<p>With the archive now on my local attacker machine, I extracted its contents and found an SSH private key. Since the key was protected with a passphrase, I used <strong><code>ssh2john<\/code><\/strong> to convert the private key into a hash format compatible with <strong>John the Ripper<\/strong>. After generating the hash, I ran <strong>John<\/strong> again to brute-force the passphrase. The attack was successful, and I recovered the private key\u2019s password, allowing me to use the key for SSH authentication.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"834\" height=\"241\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-28.png\" alt=\"\" class=\"wp-image-617\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-28.png 834w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-28-300x87.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-28-768x222.png 768w\" sizes=\"auto, (max-width: 834px) 100vw, 834px\" \/><\/figure>\n\n\n\n<p>After gaining SSH access as <strong>david<\/strong>, I began enumerating the system for potential privilege escalation vectors. During this process, I discovered a script in David\u2019s home directory that executed a <strong><code>sudo<\/code><\/strong> command running <code>journalctl<\/code>. Since <code>journalctl<\/code> can sometimes be abused to spawn a pager or shell under elevated privileges, this immediately looked promising. I began researching possible techniques to leverage this behavior for privilege escalation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"235\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-29.png\" alt=\"\" class=\"wp-image-618\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-29.png 771w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-29-300x91.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-29-768x234.png 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/figure>\n\n\n\n<p>While researching <code>journalctl<\/code> on <strong>GTFOBins<\/strong>, I discovered that <code>journalctl<\/code> uses <strong><code>less<\/code><\/strong> as its default pager. Because <code>less<\/code> allows shell escapes when running with elevated privileges, this behavior can potentially be abused to execute arbitrary commands as <strong>root<\/strong>. This confirmed that the <code>journalctl<\/code> sudo permission could be leveraged as a viable privilege escalation vector.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1010\" height=\"712\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-30.png\" alt=\"\" class=\"wp-image-619\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-30.png 1010w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-30-300x211.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-30-768x541.png 768w\" sizes=\"auto, (max-width: 1010px) 100vw, 1010px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"981\" height=\"483\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-31.png\" alt=\"\" class=\"wp-image-620\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-31.png 981w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-31-300x148.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-31-768x378.png 768w\" sizes=\"auto, (max-width: 981px) 100vw, 981px\" \/><\/figure>\n\n\n\n<p>After executing the command in the script, I used the technique documented on GTFOBins to exploit the pager spawned by <code>journalctl<\/code>. By escaping from the <code>less<\/code> pager, I was able to execute a shell with elevated privileges. This successfully dropped me into a <strong>root shell<\/strong>, completing the privilege escalation and giving me full control over the system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"201\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-32-1024x201.png\" alt=\"\" class=\"wp-image-621\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-32-1024x201.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-32-300x59.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-32-768x151.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2026\/02\/image-32.png 1180w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This box demonstrated the importance of thorough enumeration and careful analysis of exposed services. By identifying a vulnerable <strong>Nostromo 1.9.6<\/strong> web server, I was able to gain initial access through a remote command execution vulnerability. From there, credential discovery and password cracking allowed lateral movement to the <strong>david<\/strong> user. Finally, misconfigured <code>sudo<\/code> permissions involving <code>journalctl<\/code> provided a straightforward path to privilege escalation via pager escape, resulting in full root access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I began with an Nmap scan to identify open TCP ports, detect service versions, and run the default NSE scripts. The scan revealed two open ports: 22 (SSH) and 80 (HTTP). Port 80 was hosting a web server identified as Nostromo version 1.9.6. This immediately caught my attention, as Nostromo [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":622,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=605"}],"version-history":[{"count":2,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/605\/revisions"}],"predecessor-version":[{"id":623,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/605\/revisions\/623"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/media\/622"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}